Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
b2d697750ce1b03beadd687f70d33323_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2d697750ce1b03beadd687f70d33323_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b2d697750ce1b03beadd687f70d33323_JaffaCakes118.html
-
Size
53KB
-
MD5
b2d697750ce1b03beadd687f70d33323
-
SHA1
2d3ee44b36eae042318cb303343f6b6b31f19081
-
SHA256
195db9276b4992dad39c2a9701a38c6193a26fa4371e7d4678c8b85e93f8f8b3
-
SHA512
9612837c50c3d5926305cec37067fad4a03b974a8c5125f7e4df1355b27bc88fcd689ff3ec160e0ee4b6b6d3bd3ffc9f86f21b2d5c457dc30fae660fd6e56184
-
SSDEEP
1536:CkgUiIakTqGivi+PyUrrunlYL63Nj+q5VyvR0w2AzTICbbPo4/t9M/dNwIUTDmDN:CkgUiIakTqGivi+PyUrrunlYL63Nj+qr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5ABDC51-5F9A-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430392330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ac6d220ccd1f6192be5fcfa1fe290bb48c841c0220f2cb106e699037c3af1a45000000000e8000000002000020000000f21afbacede29a79f1ec31b12b40c0cac9a7d0e38df331d55cbaae67cc64a25820000000729e6b9f4f8f201dfe9785345d8ee3c3c15ab27112a1fc41f444c957ce4f3fa040000000353285bd616f51a14797c3bdbe689ef121a3cb64f566f3a4475ae13e66b909b23b6061aec34175eda3a0b9ada76245225c4241d8691029f61fe85f70c0edb05e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07304cda7f3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2100 1712 iexplore.exe 30 PID 1712 wrote to memory of 2100 1712 iexplore.exe 30 PID 1712 wrote to memory of 2100 1712 iexplore.exe 30 PID 1712 wrote to memory of 2100 1712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2d697750ce1b03beadd687f70d33323_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a69b77eff12a4956e77e9a9abae6770b
SHA1b3db97aeb68cb57625a3d4d2f20cd2d604959c7f
SHA256f85d7447f7a87f6df90c4a7d1c29209f92b58d8738f5ff55abee9fb057591d4c
SHA51288315f8bbfde933b9ac1f73f46d5b716e03fbc250cf1b92ae88c2fb67743d542ec21635efc2a243c29def8fa433549b88cb031baebe1d35f949823c5415be50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f733d4e445708d3e1157e1a28cca8a
SHA15ef57bccf1ab3df16de64d4c421c6e87ad3e8a40
SHA2561fae104594d6604ad7447beb3579f4b92038dcb477d1bb083d7a3dd564849e1e
SHA512d9379c4de7744720d6faca8838e63dd8a4b18b986feebd7996f4683924335f092349200e687fd61dd5679a69cff8497800434c7b724f8d131d4e635eab7530a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29d63e1315b25d2d6a081630156b6ae
SHA10119b645691cf7aa671857a055595e4447d93c16
SHA2564abf5d4213817b90a11d1be80815e63f967a61614fe7a3648892749132528ba9
SHA512eb423975c43ee80ca82572e08cf90258e3c9c1734bcfadb0b5e96506994d4449e2372e2387e9a6b3995e052674480965d2b08f3c2eb91bb54372e64e88f2afdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ef9fac0101620197ea1b941a13ff41
SHA17cb1f9c4370a507b71da799937e6337444a9022a
SHA2560e1f124c04d2004d726e5bbf05475ccd6653ce786cff7be15c1705e11ca73ed8
SHA5123f2aaa822240bb23fcc4e654b352d26a05c8561c7a2bdfb7d487a03b94ee0dea79c236edb57486a456bb03af193ed8421511baaba14da923c454a8b63b2fdb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e16b0fc3f428bdc49bfac94b7e32031
SHA1f1a3021f3aea03e3d5819b77fecc807b0d123b86
SHA2561173bedafe239ad39cde2555e1eec27be4bd86e96bd5efe17347c84d9fc63837
SHA512735353aa73e8430cc55a903f90015fb327c3abd2d1fdbb792acc3984ca2b473d9db4cd77c41230571f1c68f07f77b4633facd3bc373b7608596dba94604ca7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9cf5ae1c5662aaa287fa4483faa209
SHA18aac902636874399c5ccc8e0f8a1a82799f7ceeb
SHA25699093c863eed77fba6704bb77cb0781125c607044cfcf6499221c1b330529bfb
SHA512106e77751841acc1840db29f0f118e1e5090e19a2e2bf7f5d2a320b1db8ab21d9e13c48fc7ed353a6639ebd989bb666b676f174852b2909c676b45fa7dc4aa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53442d17ea62329b0d88d4b6ad9ce930e
SHA197c7a1704906c67e029a889a4a9b1d06c8783748
SHA25686b5fbb0bde36b54ba766dcbe627167c45042f5a34c1bc7b260dbdeca94a500e
SHA512c6000623646e749201480ccef8dab4d74cfe7967a86d94818b9c44b5d6c3d19343161245f3d9fc9f16eb124827c64807ce4482565d085509e5c2b9a162c05309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55901766297c0010394b04c7f08c419fe
SHA1039ce801a91d2d89e5a0295b7d1702f8be6964c0
SHA256b76823b81563fbb222bf4b725d02f57c1a518d333e37717fb93ff97a36c45226
SHA512f5a74a59df9f42232163cf0b821ee81e548fb53821e48caab10bca1d64ac4c5ee7284772b56663b16c62d3a025606ffef51a8619c2f8a8f8c870c7555ebe21b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ceab48262e8385cd4865f97f2815587
SHA16301fdb048e365ead99f98ae90d1da5f805f1b82
SHA2567b4c9919faae4b9b757280c60b5154f2da6279afb03f0ceae2a52bc6f04209f7
SHA512a7172c52bde4bcee823a778ed348a71551b5fba7159027d250deda752c9d3e14eb8ef69f07a31d9218e6b91fcbe2afe00faa46e85559fb553d88f3bb5c0055e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fb44008f401c3d3a1c629efd7f5e70
SHA12ad451bb83d2711401515fa808b281d647a06042
SHA25689a602f6e686f93788dac5bbee427d88b2c953ccf73a74c5a6c82f39d558045b
SHA5122af2a69608955f63b7ff3f6ef884a69d3b4f02709e1bbab3a381ae48fbd2754653d6853d1695181f76fdbd05ef2d75923901e5090943264492f2a6631a2f2187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4d5dcf8078fb7e892638d9c7c38658
SHA1444b688b92f57b90e39db78eae31f23cff2e7194
SHA2565525ae06f9b83f118570ccff4b9c39ed50980e06e40bc3d68a109eb128a7f9ee
SHA512957e175dbfe3e6128a2b1a1f4b9bc29df0a5b770f29c13cdf473538f7435af6da2172f509e0778736885a775557e39193dc08d0cf91149f6f01beea18765c245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e90ebc7152f441de32f913b9d3b4d3
SHA17a5ca1eedf6fdd4449edfe3c2667c3acbb4b8261
SHA2563bba9cbadf4a7436a48edcd7a2bf4ac5406362c51b0f940b2110fa0c912a4a72
SHA5125db91c8391d0bfd5af693e9423fe78e51754a363e1ce63dbf72f2041030dc30b5d0dedabc2b274a870ba3fbab29fbcf0a59fcec0490afcd279f48b1cab9d5e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6acd78edbe7dad7546f9f02c17ce897
SHA179423f83fef8a890122536ad756b6d83e471b3d7
SHA2563907912c9bbb4d2eae5e989f0a9525ebe1ab7102fdeae1b34fc6593307369e43
SHA51264b6005aa46841d14a1347eed697b10d4e437335b4020ef156e15d175a8107abf93c548bef961c06ff60631c5b94e8483ebecf67555b6d6b9cb591612729d1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b530c75fc26997c0ec268f27833668e9
SHA14ef7ef840e1c4bb5fe50f51d801b222308f816cb
SHA256cf6f17d9654d8eb821812b6f8b0f3b616ddbb6a294d0ab840bd8906cc499a17a
SHA51228b526192b748c83168f284ba06bf5ffd6e64ce425f64d0f67f4f652849f465bf3cd4597cd050f5d8616752b86dcb6d1c5a6d836d61970fd6509458ee6268dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139f78e9e9f5ffd26d56263ea54a412d
SHA1ec00a147af8fe2333ffdd839c128b54f8eda5dd7
SHA2561f4adbafabe5e212c9a27def6a84f6fc432476b1d1c9237a035cfde809df5a0b
SHA5127b6783473ddb7915150e652e4c09c3dc0e4612898374af8d38e5d9bce2b6ea38184527d4017f7affe80c60bfbb98d00556897889201513bbc64b0237ed45ad5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d767ca22933b68f9300c9d37078e422e
SHA10aff6da0fdf4772fded53f5f1bb21041a1ccb42c
SHA256a5a7ee0b5fdf80464b15d6a6f735b5bffcd58955b3231ce8414685f9e0fbd52a
SHA51240f77d53c916be09a4068810da822ba789c9c4c863c03ef1deff456a47d62a3d8e1d7d3dda6f4d650137a6f9a0c4500434f6a876796ca25fa3fbd79b5b9ede17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafc7514b5103ddff897f6090e7803c1
SHA1169681fd07e628ea2ab55c171f9f25ca63d7ec0e
SHA256c31b6d514a613753f17525ccc11e25c372ccb5c860e8a4143f1bb09bdbbf627d
SHA5124485628680cfccf336b6a4f1e7e4ed854437417bfba72cb66dccf490ffb8077041921cc869888beec36d791cef0f57dbb5dbd0ee377fa38a074fa1f46d511e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e2c1b9f14bd88e798cc169ec0700f1
SHA1ae15ef8228c410b8dd50f69c04932aa66cc873bc
SHA256813326c73cc98b1e4733e2e1403cdd54ba27a8a5fd90c2ff00b4a82dabb58a82
SHA51232644bef61af00fc3ed9af4265fcce21036da33553fc3a9878c60da3a0cfabe72d3df9c65bcadc74a819e12f926e945fa65bb8f0aa1a8c3534e09f4b580ddd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fba760988782982820548fbee550d74
SHA10ea2158eca7f9b5cf489d1edcd405382ff5f2cdd
SHA256ce362d9f554354a67608d3626aeb3ef5dc7135aede6911143edde2293bb482ad
SHA512c394cd1abcf1a5d132c6bf788cea2403d63adb2ac94f181f7e4cee322762eb58437c172b59ac8a164afa011b6e6d61370b9023a78a4eecc5c5d5036a550eca6f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b